SC-100T00: Microsoft Cybersecurity Architect

Description

Duration: 4 days

SC-100T00 Microsoft Cybersecurity Architect is an expert-level course aimed at seasoned cloud security engineers. The course covers how to design and evaluate cybersecurity strategies across Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and application security. Participants will work through architecting solutions based on Zero Trust principles and defining security requirements for cloud infrastructure across SaaS, PaaS, and IaaS service models.

Target Audience

  • Experienced cloud security engineers who have already earned a certification in the security, compliance, and identity portfolio
  • Professionals with deep knowledge and hands-on experience in identity and access, platform protection, security operations, data security, and application security
  • Professionals who have worked with hybrid and cloud environments

Prerequisites

  • Completion of an associate-level certification in the security, compliance, and identity portfolio is strongly recommended (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00 Microsoft Security Operations Analyst, or SC-300T00 Microsoft Identity and Access Administrator)
  • Strong working knowledge of identity and access, platform protection, security operations, data security, and application security
  • Prior experience with hybrid and cloud deployments

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers & Onsite Certification Testing – (excluding Adobe and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

With several convenient training delivery methods offered, The Code Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Code Academy for an engaging and effective learning experience.

Methods

  • Instructor Led (the best training format we offer)
  • Live Online Classroom – Online Instructor Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic Enroll Private PricePrivate Enroll
5/25/20265/28/2026
6/15/20266/18/2026
7/6/20267/9/2026
7/27/20267/30/2026
8/17/20268/20/2026
9/7/20269/10/2026
9/28/202610/1/2026
10/19/202610/22/2026
11/9/202611/12/2026
11/30/202612/3/2026
12/21/202612/24/2026
1/11/20271/14/2027
2/1/20272/4/2027
2/22/20272/25/2027
3/15/20273/18/2027
4/5/20274/8/2027
4/26/20274/29/2027
Learning Objectives
Course Outline
Module 1: Zero Trust fundamentals and best practice frameworks

Zero Trust initiatives; Zero Trust technology pillars part 1; Zero Trust technology pillars part 2.

Module 2: Aligning solutions with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)

Defining a security strategy; Secure methodology within the Cloud Adoption Framework; Incorporating security into Azure Landing Zones; Security considerations within the Well-Architected Framework.

Module 3: Aligning solutions with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft Cloud Security Benchmark (MCSB)

Applying best practices for security capabilities and controls; Applying best practices for attack protection.

Module 4: Building a resiliency strategy against common cyberthreats including ransomware

Common cyberthreats and attack patterns; Supporting business resiliency; Ransomware protection approaches; Secure backup and restore configurations; Security updates.

Module 5: Case study: Applying security best practices and priorities

Case study description; Case study answers; Conceptual walkthrough; Technical walkthrough.

Module 6: Designing solutions for regulatory compliance

Translating compliance requirements into a security solution; Meeting compliance requirements with Microsoft Purview; Addressing privacy requirements with Microsoft Priva; Meeting security and compliance requirements with Azure Policy; Assessing infrastructure compliance using Defender for Cloud.

Module 7: Designing solutions for identity and access management

Designing cloud, hybrid, and multicloud access strategies (including Microsoft Entra ID); Designing a solution for external identities; Designing modern authentication and authorization strategies; Aligning conditional access with Zero Trust; Defining requirements to secure Active Directory Domain Services (AD DS); Designing a solution for managing secrets, keys, and certificates.

Module 8: Designing solutions for securing privileged access

The enterprise access model; Designing identity governance solutions; Designing a solution for secure tenant administration; Designing a solution for cloud infrastructure entitlement management (CIEM); Designing a solution for privileged access workstations and bastion services.

Module 9: Designing solutions for security operations

Designing security operations capabilities in hybrid and multicloud environments; Designing centralized logging and auditing; Designing security information and event management (SIEM) solutions; Designing detection and response solutions; Designing a solution for security orchestration, automation, and response (SOAR); Designing security workflows; Designing threat detection coverage.

Module 10: Case study: Security operations, identity, and compliance capabilities

Case study description; Case study answers; Conceptual walkthrough; Technical walkthrough.

Module 11: Designing solutions for securing Microsoft 365

Evaluating security posture for collaboration and productivity workloads; Designing a Microsoft Defender XDR solution; Designing configurations and operational practices for Microsoft 365.

Module 12: Designing solutions for securing applications

Defining and implementing standards for secure application development; Evaluating the security posture of existing application portfolios; Assessing application threats through threat modeling; Designing a security lifecycle strategy for applications; Securing access for workload identities; Designing a solution for API management and security; Designing a solution for secure application access.

Module 13: Designing solutions for securing organizational data

Designing a solution for data discovery and classification using Microsoft Purview; Designing a data protection solution; Designing data security for Azure workloads; Designing security for Azure Storage; Designing a security solution using Microsoft Defender for SQL and Microsoft Defender for Storage.

Module 14: Case study: Security solutions for applications and data

Case study description; Case study answers; Conceptual walkthrough; Technical walkthrough.

Module 15: Defining security requirements for SaaS, PaaS, and IaaS services

Establishing security baselines for SaaS, PaaS, and IaaS services; Defining security requirements for web workloads; Defining security requirements for containers and container orchestration.

Module 16: Designing solutions for security posture management in hybrid and multicloud environments

Assessing security posture using the Microsoft Cloud Security Benchmark; Designing integrated posture management and workload protection; Evaluating security posture with Microsoft Defender for Cloud; Using Microsoft Defender for Cloud secure score for posture evaluation; Designing cloud workload protection with Microsoft Defender for Cloud; Integrating hybrid and multicloud environments using Azure Arc; Designing a solution for external attack surface management.

Module 17: Designing solutions for securing server and client endpoints

Defining server security requirements; Defining requirements for mobile devices and clients; Defining security requirements for IoT and embedded devices; Securing operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT; Establishing security baselines for server and client endpoints; Designing a solution for secure remote access.

Module 18: Designing solutions for network security

Designing solutions for network segmentation; Designing traffic filtering solutions using network security groups; Designing solutions for network posture management; Designing solutions for network monitoring.

Module 19: Case study: Security solutions for infrastructure

Case study description; Case study answers; Conceptual walkthrough; Technical walkthrough.